Cyber attacks are increasing in volume, frequency, and complexity. In response, the security community is looking toward fully automating cyber defense systems using machine learning. However, so far the resultant effects on the coevolutionary dynamics of attackers and defenders have not been examined. In this whitepaper, we hypothesise that increased automation on both sides will accelerate the coevolutionary cycle, thus begging the question of whether there are any resultant fixed points, and how they are characterised. Working within the threat model of Locked Shields, Europe's largest cyberdefense exercise, we study blackbox adversarial attacks on network classifiers. Given already existing attack capabilities, we question the utility of optimal evasion attack frameworks based on minimal evasion distances. Instead, we suggest a novel reinforcement learning setting that can be used to efficiently generate arbitrary adversarial perturbations. We then argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions, and introduce a temporally extended multi-agent reinforcement learning framework in which the resultant dynamics can be studied. We hypothesise that one plausible fixed point of AI-NIDS may be a scenario where the defense strategy relies heavily on whitelisted feature flow subspaces. Finally, we demonstrate that a continual learning approach is required to study attacker-defender dynamics in temporally extended general-sum games.
翻译:网络攻击的数量、频率和复杂性都在增加。作为回应,安全界正在寻求利用机器学习充分自动化网络防御系统。然而,迄今为止,尚未研究对攻击者和维权者革命动力的影响。在本白皮书中,我们假设双方提高自动化将加速连动周期,从而乞求是否有相应的固定点,以及这些点的特征如何。在封闭盾牌的威胁模式(欧洲最大的网络防御演习)范围内工作,我们研究网络分类人员遭受的对称攻击的黑盒。鉴于现有的攻击能力,我们质疑以最低规避距离为基础的最佳规避攻击框架的效用。相反,我们建议采用新的强化学习环境,以便有效地产生任意的对抗干扰。然后我们争辩说,攻击者-阻击者固定点本身是具有复杂阶段过渡性的一般和游戏,并引入一个可以研究其结果动态的时长多试强化学习框架。我们假设,基于现有攻击能力,基于最小的规避距离,我们质疑最佳规避框架框架框架框架的效用。相反,我们建议使用新的强化学习环境环境,从而有效地产生任意的对抗性干扰。然后,我们说,攻击者固定点本身需要长期的时空空间研究。